-
-
Notifications
You must be signed in to change notification settings - Fork 0
Closed
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
CVE-2022-0624 - Medium Severity Vulnerability
Vulnerable Library - parse-path-4.0.3.tgz
Parse paths (local paths, urls: ssh/git/etc)
Library home page: https://registry.npmjs.org/parse-path/-/parse-path-4.0.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/parse-path/package.json
Dependency Hierarchy:
- release-it-15.1.1.tgz (Root Library)
- git-url-parse-11.6.0.tgz
- git-up-4.0.2.tgz
- parse-url-5.0.2.tgz
- ❌ parse-path-4.0.3.tgz (Vulnerable Library)
- parse-url-5.0.2.tgz
- git-up-4.0.2.tgz
- git-url-parse-11.6.0.tgz
Found in HEAD commit: ab82099b14d398d093bec389dcfaee3fd8bb6f07
Found in base branch: master
Vulnerability Details
Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.
Publish Date: 2022-06-28
URL: CVE-2022-0624
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0624
Release Date: 2022-06-28
Fix Resolution: parse-path - 5.0.0
Step up your Open Source Security Game with Mend here
Metadata
Metadata
Assignees
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource